CVE-2015-5123
KEV
🔴 Łataj teraz
Wykorzystanie po zwolnieniu pamięci w Adobe Flash Player umożliwia zdalne wykonanie kodu.
CVSS
9.8
EPSS
41.0%
Exploit
weaponized
Vendor
redhat
Opis źródłowy (NVD)
Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
dos
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 41.0% |
| Opublikowano (NVD) | 2015-07-14 10:59:01 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-21 21:08:27 UTC |
Referencje
- http://blog.trendmicro.com/trendlabs-security-intelligence/new-zero-day-vulnerability-cve-2015-5123-in-adobe-flash-emerges-from-hacking-team-leak/ (psirt@adobe.com) [Broken Link, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00028.html (psirt@adobe.com) [Mailing List, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html (psirt@adobe.com) [Mailing List, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html (psirt@adobe.com) [Mailing List, Third Party Advisory]
- http://marc.info/?l=bugtraq&m=144050155601375&w=2 (psirt@adobe.com) [Mailing List, Third Party Advisory]
- http://rhn.redhat.com/errata/RHSA-2015-1235.html (psirt@adobe.com) [Third Party Advisory]
- http://www.kb.cert.org/vuls/id/918568 (psirt@adobe.com) [Third Party Advisory, US Government Resource]
- http://www.securityfocus.com/bid/75710 (psirt@adobe.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1032890 (psirt@adobe.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.us-cert.gov/ncas/alerts/TA15-195A (psirt@adobe.com) [Third Party Advisory, US Government Resource]
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04796784 (psirt@adobe.com) [Broken Link, Third Party Advisory]
- https://helpx.adobe.com/security/products/flash-player/apsa15-04.html (psirt@adobe.com) [Broken Link, Vendor Advisory]
- https://helpx.adobe.com/security/products/flash-player/apsb15-18.html (psirt@adobe.com) [Broken Link, Vendor Advisory]
- https://security.gentoo.org/glsa/201508-01 (psirt@adobe.com) [Third Party Advisory]
- https://github.com/cisagov/vulnrichment/issues/196 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [Issue Tracking]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-5123 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]